![]() It should be noted, that this is NOT reverse engineering like everyone says. I want to provide content for new people to become involved. When you join this course you will be able to watch the lectures' videos and to download the slides presentation, in addition to an executable file example that we are going to use during our practical tests in this course. This is something I found in a back up from my old Server. It is included in the files download for this tut. In this tutorial, all you need is OllyDBG (either my version or the original), and a copy of my revised crackme, which, by the way, I am calling the First Assembly Kracking Engine, or F.A.K.E. How to create Breakpoints? and what is the difference between Software and Hardware Breakpoints?Īnd, how to debug a DLL file using OllyDBG? Next tutorial we will be going over a real crackme (I promise). ![]() What is stepping into and stepping over in debugging? What is the difference between compiler, assembler, disassembler and debugger? This course is prepared for students interested in debugging and analyzing applications or malware analysis, In this course you will learn how to convert an executable file to assembly language and then to read what this executable is doing, you will also be able to modify the function of this executable and export a new modified executable.īefore joining this course you must be familiar with assembly language and the portable executable files architecture.Īfter attending this course you will be able to answer the following questions :
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |